Journal articles on the topic 'Protocols'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Protocols.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Shi, Lu-Feng, Karen A. Doherty, Tammy M. Kordas, and Joseph T. Pellegrino. "Short-Term and Long-Term Hearing Aid Benefit and User Satisfaction: A Comparison between Two Fitting Protocols." Journal of the American Academy of Audiology 18, no. 06 (June 2007): 482–95. http://dx.doi.org/10.3766/jaaa.18.6.3.
Full textCameron, Thomas, Doson Chua, Stephen Shalansky, Edwin Tam, and Erica Wang. "Comparison of a Fully Weight-Based Protocol with a Non–Weight-Based Dosage Titration Protocol for IV Unfractionated Heparin: A Before-and-After Study." Canadian Journal of Hospital Pharmacy 76, no. 1 (January 9, 2023): 23–28. http://dx.doi.org/10.4212/cjhp.3265.
Full textPeixoto, João Alvarez, André Borin Soares, and Vitor Macedo Ochôa. "Internet das Coisas Industrial: um ensaio de protocolos IoT para manufatura industrial." Revista Eletrônica Científica da UERGS 8, no. 3 (December 23, 2022): 178–87. http://dx.doi.org/10.21674/2448-0479.83.178-187.
Full textLi, Jian, and Chong-Qiang Ye. "Multi-party semi-quantum secret sharing protocol based on measure-flip and reflect operations." Laser Physics Letters 21, no. 7 (May 30, 2024): 075201. http://dx.doi.org/10.1088/1612-202x/ad4eb6.
Full textGuo, Hua, Chen Chen, Ya Gao, Xiong Li, and Jiongchao Jin. "A Secure Three-Factor Multiserver Authentication Protocol against the Honest-But-Curious Servers." Wireless Communications and Mobile Computing 2018 (September 13, 2018): 1–14. http://dx.doi.org/10.1155/2018/3284324.
Full textSaunders, Diana. "The Protocol of Protocols." Practice Nursing 9, no. 10 (June 2, 1998): 3. http://dx.doi.org/10.12968/pnur.1998.9.10.3.
Full textReges Bessa, Carlos Deyvinson. "PERFORMANCE EVALUATION ANALYSIS OF WIRELESS SENSOR NETWORKS ROUTING PROTOCOLS IN SMART GRIDS." Revista Cientifica TECNIA 26, no. 1 (August 16, 2016): 9. http://dx.doi.org/10.21754/tecnia-250215.02.
Full textReges Bessa, Carlos Deyvinson. "PERFORMANCE EVALUATION ANALYSIS OF WIRELESS SENSOR NETWORKS ROUTING PROTOCOLS IN SMART GRIDS." Revista Cientifica TECNIA 26, no. 1 (August 16, 2016): 17. http://dx.doi.org/10.21754/tecnia-26012016.02.
Full textReges Bessa, Carlos Deyvinson, Rodrigo Soares Semente, Xiankleber Cavalcante Benjamim, Talison Augusto Correia de Melo, Felipe Denis Mendonça de Oliveira, Daniel Holanda Noronha, Antônio Eduardo de Morais Silva, André Laurindo Maitelli, and Andrés Ortiz Salazar. "PERFORMANCE EVALUATION ANALYSIS OF WIRELESS SENSOR NETWORKS ROUTING PROTOCOLS IN SMART GRIDS." Revista Cientifica TECNIA 26, no. 1 (November 28, 2016): 17. http://dx.doi.org/10.21754/tecnia.v26i1.2.
Full textBeattie, Randall C. "Distortion Product Otoacoustic Emissions: Comparison of Sequential versus Simultaneous Presentation of Primary-Tone Pairs." Journal of the American Academy of Audiology 14, no. 09 (October 2003): 471–84. http://dx.doi.org/10.1055/s-0040-1715939.
Full textCorredor-Matus, José R., Carlos J. Sejín-Puche, and Mario A. González- G. "Evaluación de cinco protocolos de conservación de tejidos en chigüiro (Hydrochaeris Hydrochaeris) (Linnaeus, 1766)." Orinoquia 14, no. 2 sup (December 1, 2010): 110–25. http://dx.doi.org/10.22579/20112629.98.
Full textKhan, Muhammad, Yasir Zaki, Shiva Iyer, Talal Ahamd, Thomas Poetsch, Jay Chen, Anirudh Sivaraman, and Lakshmi Subramanian. "The case for model-driven interpretability of delay-based congestion control protocols." ACM SIGCOMM Computer Communication Review 51, no. 1 (January 31, 2021): 18–25. http://dx.doi.org/10.1145/3457175.3457179.
Full textHU, YANJING, QINGQI PEI, and LIAOJUN PANG. "Instruction Clustering Analysis for Unknown Network Protocol's Abnormal Behavior." Journal of Interconnection Networks 15, no. 03n04 (September 2015): 1540002. http://dx.doi.org/10.1142/s0219265915400022.
Full textJouyandeh, Narjes, and bReza EbrahimiAtani. "A Review of Data Aggregation Protocols in VANET and providing proposed protocol." International Academic Journal of Science and Engineering 05, no. 01 (June 1, 2018): 134–44. http://dx.doi.org/10.9756/iajse/v5i1/1810012.
Full textSun, Xin, Piotr Kulicki, and Mirek Sopek. "Multi-Party Quantum Byzantine Agreement without Entanglement." Entropy 22, no. 10 (October 14, 2020): 1152. http://dx.doi.org/10.3390/e22101152.
Full textLee, Young Moo, and Kyu Ho Park. "A protocol converter for nonblocking protocols." Integration 33, no. 1-2 (December 2002): 71–88. http://dx.doi.org/10.1016/s0167-9260(02)00049-4.
Full textRekha, H., and M. Siddappa. "Model Checking M2M and Centralised IOT authentication Protocols." Journal of Physics: Conference Series 2161, no. 1 (January 1, 2022): 012042. http://dx.doi.org/10.1088/1742-6596/2161/1/012042.
Full textWang, Ying Lian, and Jun Yao Ye. "Research on Applied-Information Technology in Hierarchical Network Security Protocols Designing Based on Public Key." Advanced Materials Research 951 (May 2014): 169–72. http://dx.doi.org/10.4028/www.scientific.net/amr.951.169.
Full textKudin, Anton, and Polina Seliukh. "Asymmetric cryptographic protocols with a blockchain core: development problems and their solutions." Physico-mathematical modelling and informational technologies, no. 32 (July 8, 2021): 175–80. http://dx.doi.org/10.15407/fmmit2021.32.175.
Full textSun, Nigang, Junlong Li, Yining Liu, and Varsha Arya. "A Scalable Sharding Protocol Based on Cross-Shard Dynamic Transaction Confirmation for Alliance Chain in Intelligent Systems." International Journal on Semantic Web and Information Systems 19, no. 1 (November 7, 2023): 1–30. http://dx.doi.org/10.4018/ijswis.333063.
Full textYousif, Samar T. "SIMULATION AND COMPARISON OF AD HOC NETWORKS ROUTING PROTOCOLS BASED ON OPNET." Iraqi Journal of Information and Communication Technology 5, no. 1 (April 29, 2022): 42–49. http://dx.doi.org/10.31987/ijict.5.1.190.
Full textZhu, Xinghui, Ziheng Jiang, Qiyuan Zhang, Shuangrui Zhao, and Zhiwei Zhang. "An Unknown Protocol Identification Method for Industrial Internet." Wireless Communications and Mobile Computing 2022 (September 5, 2022): 1–14. http://dx.doi.org/10.1155/2022/3792205.
Full textSalkica, Nusret, Amela Begić, Adnan Beganović, Fuad Julardžija, Adnan Šehić, Halil Ćorović, Safet Hadžimusić, and Amra Skopljak-Beganović. "Optimisation of the bone single photon emission computed tomography in oncology patients." Journal of Health Sciences 13, no. 3 (Suplement 1) (February 25, 2024): 209–12. http://dx.doi.org/10.17532/jhs.2023.2596.
Full textAlfouzan, Faisal Abdulaziz. "Energy-Efficient Collision Avoidance MAC Protocols for Underwater Sensor Networks: Survey and Challenges." Journal of Marine Science and Engineering 9, no. 7 (July 4, 2021): 741. http://dx.doi.org/10.3390/jmse9070741.
Full textSabor, Nabil, Shigenobu Sasaki, Mohammed Abo-Zahhad, and Sabah M. Ahmed. "A Comprehensive Survey on Hierarchical-Based Routing Protocols for Mobile Wireless Sensor Networks: Review, Taxonomy, and Future Directions." Wireless Communications and Mobile Computing 2017 (2017): 1–23. http://dx.doi.org/10.1155/2017/2818542.
Full textZhang, Bo, Wei-Xu Shi, Jian Wang, and Chao-Jing Tang. "Quantum direct communication protocol strengthening against Pavičić’s attack." International Journal of Quantum Information 13, no. 07 (October 2015): 1550052. http://dx.doi.org/10.1142/s0219749915500525.
Full textRong, Zhenbang, Daowen Qiu, and Xiangfu Zou. "Two single-state semi-quantum secure direct communication protocols based on single photons." International Journal of Modern Physics B 34, no. 11 (April 30, 2020): 2050106. http://dx.doi.org/10.1142/s0217979220501064.
Full textCai, Jianfei, Guozheng Yang, Jingju Liu, and Yi Xie. "FastCAT: A framework for fast routing table calculation incorporating multiple protocols." Mathematical Biosciences and Engineering 20, no. 9 (2023): 16528–50. http://dx.doi.org/10.3934/mbe.2023737.
Full textGoyal, Dinesh, Anil Kumar, Yatin Gandhi, and Vinit Khetani. "Securing wireless sensor networks with novel hybrid lightweight cryptographic protocols." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 2-B (2024): 703–14. http://dx.doi.org/10.47974/jdmsc-1921.
Full textHuang, Chung-Ming, and Shiun-Wei Lee. "Timed protocol verification for Estelle-specified protocols." ACM SIGCOMM Computer Communication Review 25, no. 3 (July 1995): 4–32. http://dx.doi.org/10.1145/214299.214300.
Full textToprak, Talip, Doğuş Bakici, Ayşenur Turgut Kaymakçi, and Ertuğrul Gelen. "Effects of Static and Dynamic Post-Activation Potentiation Protocols on Change of Direction Performance in Adolescent Soccer Players." Acta Facultatis Educationis Physicae Universitatis Comenianae 62, no. 2 (November 1, 2022): 96–108. http://dx.doi.org/10.2478/afepuc-2022-0009.
Full textMidha, Surabhi, and Anand Nayyar. "A Survey of Wireless Sensor Network Routing Protocols based on SPIN." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 6 (June 30, 2014): 4583–92. http://dx.doi.org/10.24297/ijct.v13i6.2521.
Full textDíaz Gómez, María Angustias, and Elicio Díaz Gómez. "Reflexiones sobre el Real Decreto español 171/2007, de 9 de febrero, por el que se regula la publicidad de los protocolos familiares en las sociedades familiares." Pecvnia : Revista de la Facultad de Ciencias Económicas y Empresariales, Universidad de León, no. 12 (June 1, 2011): 91. http://dx.doi.org/10.18002/pec.v0i12.617.
Full textLakum, Tarasvi, and Barige Thirumala Rao. "Mutual query data sharing protocol for public key encryption through chosen-ciphertext attack in cloud environment." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 1 (February 1, 2022): 853. http://dx.doi.org/10.11591/ijece.v12i1.pp853-858.
Full textHarista, Dessy Rindiyanti, Akh Choirul Abdi, and Mohammad Shiddiq Suryadi. "RELATIONSHIP BETWEEN AGE AND COVID-19 HEALTH PROTOCOL COMPLIANCE IN SAMPANG COMMUNITY, INDONESIA." Proceeding of International Conference of Kerta Cendekia 2, no. 1 (April 26, 2023): 199–202. http://dx.doi.org/10.36720/ickc.v2i1.521.
Full textKing, Annabelle, Mark Hancock, and Joanne Munn. "The Reliability of the Lateral Step Test." Journal of Sport Rehabilitation 16, no. 2 (May 2007): 131–42. http://dx.doi.org/10.1123/jsr.16.2.131.
Full textSong, Jian, Guang-song Li, Bo-ru Xu, and Chuan-gui Ma. "A Novel Multiserver Authentication Protocol with Multifactors for Cloud Service." Security and Communication Networks 2018 (November 19, 2018): 1–13. http://dx.doi.org/10.1155/2018/5432960.
Full textSaid,, Hilal Bello, Haider Kareem Abdulabbas,, and Mahmod Ismail. "Performance Evaluation of MANET Routing Protocols Based on Internet Protocols." International Journal of Engineering Research 4, no. 11 (November 1, 2015): 599–603. http://dx.doi.org/10.17950/ijer/v4s11/1105.
Full textLi, Quanrun, Ching-Fang Hsu, Kim-Kwang Raymond Choo, and Debiao He. "A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks." Security and Communication Networks 2019 (December 4, 2019): 1–13. http://dx.doi.org/10.1155/2019/7871067.
Full textZafeiridis, Andreas, Stylianos Rizos, Haralampos Sarivasiliou, Anastassios Kazias, Konstantina Dipla, and Ioannis S. Vrabas. "The extent of aerobic system activation during continuous and interval exercise protocols in young adolescents and men." Applied Physiology, Nutrition, and Metabolism 36, no. 1 (January 2011): 128–36. http://dx.doi.org/10.1139/h10-096.
Full textGong, Wenjie, Lei Wang, Sophia Stock, Ming Ni, Maria-Luisa Schubert, Brigitte Neuber, Christian Kleist, et al. "Evaluation of Production Protocols for the Generation of NY-ESO-1-Specific T Cells." Cells 10, no. 1 (January 14, 2021): 152. http://dx.doi.org/10.3390/cells10010152.
Full textGerard, Ian J., Jeffery A. Hall, Kelvin Mok, and D. Louis Collins. "New Protocol for Skin Landmark Registration in Image-Guided Neurosurgery: Technical Note." Operative Neurosurgery 11, no. 3 (June 26, 2015): 376–81. http://dx.doi.org/10.1227/neu.0000000000000868.
Full textCronie, Doug J., Marlies Rijnders, Raymond de Vries, and Simone Buitendijk. "Making Evidence Available for Hospital-Based Midwives: A Systematic Examination of the Content and Methodological Quality of Three Protocols Used in Maternity Hospitals in the Netherlands." International Journal of Childbirth 4, no. 4 (2014): 208–18. http://dx.doi.org/10.1891/2156-5287.4.4.208.
Full textSutton, Anthea, Maria del Carmen Galvan de la Cruz, Andrew Booth, and Joanna Leaviss. "VP198 Efficient Retrieval Of Trial Protocols: An Empirical Study." International Journal of Technology Assessment in Health Care 33, S1 (2017): 242. http://dx.doi.org/10.1017/s0266462317004251.
Full textYao, Wenbing, Sheng-Uei Guan, Zhiqiang Jiang, and Ilias Kiourktsidis. "Self-Evolvable Protocol Design Using Genetic Algorithms." International Journal of Applied Evolutionary Computation 1, no. 1 (January 2010): 36–56. http://dx.doi.org/10.4018/jaec.2010010103.
Full textAyesha Nasir and Unsa Tariq. "A Comparative Study of Routing Protocols Including RIP, OSPF and BGP." Lahore Garrison University Research Journal of Computer Science and Information Technology 2, no. 2 (June 29, 2018): 47–56. http://dx.doi.org/10.54692/lgurjcsit.2018.020236.
Full textLiu, Kaijun, Zhou Zhou, Qiang Cao, Guosheng Xu, Chenyu Wang, Yuan Gao, Weikai Zeng, and Guoai Xu. "A Robust and Effective Two-Factor Authentication (2FA) Protocol Based on ECC for Mobile Computing." Applied Sciences 13, no. 7 (March 30, 2023): 4425. http://dx.doi.org/10.3390/app13074425.
Full textChen, Xiaojuan, and Huiwen Deng. "Efficient Verification of Cryptographic Protocols with Dynamic Epistemic Logic." Applied Sciences 10, no. 18 (September 21, 2020): 6577. http://dx.doi.org/10.3390/app10186577.
Full textAbu Dhailah, Hala, Eyad Taqieddin, and Abdallah Alma'aitah. "An Enhanced and Resource-Aware RFID Multitag Grouping Protocol." Security and Communication Networks 2019 (May 23, 2019): 1–15. http://dx.doi.org/10.1155/2019/6862052.
Full textRagab, Ahmed Refaat, and Pablo Flores. "Adapting Ad-hoc Routing Protocol for Unmanned Aerial Vehicle Systems." International Journal of Data Science 2, no. 1 (April 8, 2021): 1–8. http://dx.doi.org/10.18517/ijods.2.1.1-8.2021.
Full text